README 2.5 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970
  1. pam_limits — PAM module to limit resources
  2. ━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━━
  3. DESCRIPTION
  4. The pam_limits PAM module sets limits on the system resources that can be
  5. obtained in a user-session. Users of uid=0 are affected by this limits, too.
  6. By default limits are taken from the /etc/security/limits.conf config file.
  7. Then individual *.conf files from the /etc/security/limits.d/ directory are
  8. read. The files are parsed one after another in the order of "C" locale. The
  9. effect of the individual files is the same as if all the files were
  10. concatenated together in the order of parsing. If a config file is explicitly
  11. specified with a module option then the files in the above directory are not
  12. parsed.
  13. The module must not be called by a multithreaded application.
  14. If Linux PAM is compiled with audit support the module will report when it
  15. denies access based on limit of maximum number of concurrent login sessions.
  16. OPTIONS
  17. conf=/path/to/limits.conf
  18. Indicate an alternative limits.conf style configuration file to override
  19. the default.
  20. debug
  21. Print debug information.
  22. set_all
  23. Set the limits for which no value is specified in the configuration file to
  24. the one from the process with the PID 1. Please note that if the init
  25. process is systemd these limits will not be the kernel default limits and
  26. this option should not be used.
  27. utmp_early
  28. Some broken applications actually allocate a utmp entry for the user before
  29. the user is admitted to the system. If some of the services you are
  30. configuring PAM for do this, you can selectively use this module argument
  31. to compensate for this behavior and at the same time maintain system-wide
  32. consistency with a single limits.conf file.
  33. noaudit
  34. Do not report exceeded maximum logins count to the audit subsystem.
  35. EXAMPLES
  36. These are some example lines which might be specified in /etc/security/
  37. limits.conf.
  38. * soft core 0
  39. * hard nofile 512
  40. @student hard nproc 20
  41. @faculty soft nproc 20
  42. @faculty hard nproc 50
  43. ftp hard nproc 0
  44. @student - maxlogins 4
  45. @student - nonewprivs 1
  46. :123 hard cpu 5000
  47. @500: soft cpu 10000
  48. 600:700 hard locks 10